Win the New Cybersecurity War with the New Rock Stars of Cybersecurity

Cybercrime is no longer a matter of credit card breaches. Cybercriminals are now trying to take down countries as well as top companies. Keep your organization safe. Come to the premier, one-day, high-level event designed to give real, actionable solutions to these cybersecurity threats.

Learn from and collaborate with the experts --

Oct. 27, 2015 - San Jose, California
 

Your Risk of a Major Cybersecurity Breach in 2015 is Huge

Cybersecurity Badge

You know the old joke, just because you’re paranoid doesn’t mean they’re NOT out to get you? In today’s security world, it’s not funny. The reality has shifted – from occasional breaches to daily warfare that reaches deep into the fabric of our lives. The enormity of the threat is incalculable – no matter what size your company or what business sector you occupy.

 

New Threats Require New Thinking
Rock Stars of Cybersecurity 2015 brings you this year’s top experts who can help you get ready to take on real-world problems and give you viable solutions you can put into action tomorrow. Rock Stars of Cybersecurity delivers the latest, most viable ideas in the field on questions like these and more–

  • Is your budget keeping up with your security threat?
  • What is the real threat in your business sector?
  • Do you need breach insurance?
  • Does your mobile strategy need revamping in the face of threats?
  • Advanced persistent threat tools will become the norm in 2015. How can you prepare?
  • How much information is it safe to share?
  • As threats get worse, what happens to anonymity, freedom of speech, and privacy?
  • Is there really such a thing as secure architecture?
  • And much more

Rock Stars of Cybersecurity gives you a chance to ask questions, collaborate, network, and get down to the realities of security issues.


Lunch and cocktails are served as part of the event.


Rock Stars events are “high value” and even more so while early pricing is in effect. Don’t miss your chance. Register NOW because what you don’t know can definitely hurt you.

 

speakers


Justine Bone
Bone
Jim Anderson
Anderson
 
Jamil Farshchi
Farshchi
Chris Calvert
Calvert
 
Josh Greenbaum
Greenbaum
Charles Foley
Foley
 
Dr. Spencer Soohoo
Soohoo
Marcus H. Sachs
Sachs
 
Hank Thomas
Thomas
 

Jim Anderson

President
BAE Systems America

Jim Anderson, president of the Americas of BAE Systems Applied Intelligence, brings over 25 years of experience of sales and consulting in the high-tech industry. He is an energetic leader who innovates on the edge. Anderson holds a bachelor of science in electrical engineering and computer science from Princeton University and an MBA from the Wharton School.

Justine Bone

Chief Information Security and Solutions Officer
Hoyos Labs

As Chief Information Security and Solutions Officer at Hoyos Labs, Justine Bone assures the alignment of secure solutions for enterprise and consumer customers globally. She joined Hoyos Labs from Dow Jones, where she was CISO. There she was accountable for steering the company’s information security strategies. She and her team helped define and deliver News Corp.-wide products and solutions, ensuring quality implementation and regulatory compliance while helping to increase revenue, profitability, and overall business value. She also managed Dow Jones’ Identity department, founded the DevOps group, and helped drive various cloud migration initiatives.
 

Chris Calvert, CISSP, CISM

Global Director, Solutions Innovation & Services Engineering
HP Enterprise Security Products

Chris leads the team that supports the HP Enterprise Security Products suite–ArcSight, Tipping Point, Fortify, and Atalla. Chris has over 24 years’ experience in information security. He brings extensive international experience in Europe and Asia. From 2007 to 2013, Chris was the CEO of Laconic Security, an ArcSight SIOC partner, where he personally led the design and build of many global multinational Security Operations Centers including; Walmart, Vodafone (Germany), Shell Oil (The Netherlands), Sony Network Entertainment, and Apple. Chris was previously director of professional services for Cybertrust, and manager of security intelligence and operations at IBM Global Services. Before joining IBM, Chris worked in the National Defense and Intelligence community in the field of Information Operations. He supported such agencies as the DOD Joint Staff, the Land Information Warfare Activity, and the Space Warfare Center. Chris served for 10 years in the US Army in Military Intelligence and Special Forces.

Jamil Farshchi

Chief Information Security Officer
Time Warner

Named one of the top 10 most influential Chief Information Security Officers by Sys-Con, Jamil has successfully protected some of the world’s most sensitive information assets, including nuclear weapons, financial systems and networks, and complex technologies such as the space shuttle, Hubble Telescope, and Mars Rover. As CISO at Time Warner, Jamil is charged with the unique challenge of securing and enabling some of the most engaging, valuable and widely consumed content. Jamil has a BBA from the University of Oklahoma, a MS from the Wharton School/GSE and a PLD from Harvard Business School.

 

Charles Foley

CEO
Watchful Software

Mr. Foley has over 20 years of experience leading both private and public company teams in the technology sector. Prior to Watchful Software, he was Chairman and CEO of TimeSight Systems, Inc., a developer of leading-edge storage and video management solutions for the physical security market. He also served as President of Tacit Networks, where he designed the marketing and business development strategies that led to their profitable acquisition by Packeteer. Mr. Foley sits on the Board of Directors as Chairman for Critical Links, Inc., and holding advisory positions with RackWare, Inc. and Phuture Concepts, LLC.

Joshua Greenbaum

Principal
Enterprise Applications Consulting

Joshua has over 30 years of experience in the industry as a computer programmer, systems analyst, author, consultant, and industry analyst. Josh regularly consults with leading public and private enterprise software, database, infrastructure, implementation, and hardware companies, and advises end users on technology infrastructure and applications selection, development, and implementation issues.

 

Marcus H. Sachs

Vice President, National Security Policy
Verizon

Marcus Sachs is Verizon’s Vice President for National Security Policy, and is active in several public/private partnership groups in Washington, including the Communications Sector Coordinating Council and the President’s National Security Telecommunications Advisory Committee. He holds degrees in civil engineering, computer science, and science and technology commercialization, and is pursuing a PhD in public policy.

Dr. Spencer Soohoo

CSO/Director, Scientific Computing
Cedars-Sinai Medical Center

Dr. SooHoo has been with Cedars-Sinai for over 36 years, starting first as a biomedical engineer, then a research scientist in pulmonary medicine before moving into IT to manage a research computing facility at Cedars-Sinai before it was merged with the enterprise IT organization. His roles include managing data networking, security, servers, e-mail, storage, and a data center. Dr. SooHoo earned a BS in Electrical Engineering from the University of Rochester, a MS in Electrical Engineering from George Washington University, and MS and PhD degrees in Biomedical Engineering from the University of Southern California.
 

Hank Thomas

Principal/Cyber Intelligence and Security
Booz Allen Hamilton

Hank Thomas is a Principal/Director at Booz Allen Hamilton and a founding member and a Executive Director for its Cyber4Sight threat intelligence service. Since joining the firm in late 2004, Hank has grown his business from a niche four person, government focused, cyber intelligence team to a 100+ person worldwide effort. Prior to joining the firm, Hank served as a military intelligence officer in a variety of tactical, operational, and strategic positions, including at the National Security Agency.
 

agenda


Cybersecurity Badge

Morning Session: 9:00 a.m. – Noon

Jamil Farshchi

Chief Information Security Officer
Time Warner

Securing Content in an Insecure World<

Learn how Jamil successfully protected some of the world’s most sensitive information assets, including nuclear weapons, financial systems and networks, and complex technologies such as the space shuttle, Hubble Telescope, and Mars Rover.
 

Justine Bone

Chief Information Security and Solutions Officer
Hoyos Labs

Security in the Participation Age

Technology is moving faster than Information Security best practices. New platforms, communication methods, and threats evolve faster than our ability to react. Defensive and group thinking is a part of the problem. If security gives us accountability, how do we tie in accountability from the start, and what are the implications of this on anonymity, freedom of speech, and privacy? Justine will present some new and somewhat radical technologies that help us address this challenge, most of which would completely overhaul existing digital business models and the way we manage information risk. This includes the evolution of cryptographic solutions, identity management, and digital property protection.
 

Chris Calvert, CISSP, CISM

Global Director, Solutions Innovation & Services Engineering
HP Enterprise Security Products

Security Analytics: From Data to Action

Hear about the various analysis that can be applied to the problem of Big Data security. We will break down the technologies, analytical disciplines, challenges, and approaches, and help you determine the best questions to ask of Big Data security. Learn how to get additional value from the data you collect for your information security program.
 

Lunch: Noon - 1:30 p.m.

Afternoon Session: 1:30 p.m. – 5:30 p.m.

Josh Greenbaum

Principal
Enterprise Applications Consulting

The Ever-Evolving Enterprise Threat Landscape (panel)

Panelists: Jim Anderson, President, BAE Systems America; Charles Foley, CEO of Watchful Software

Keeping track of the ever-evolving threat landscape is the first step in establishing a strategy to combat security threats.

Marcus H. Sachs

Vice President, National Security Policy
Verizon

Managing the Security Unknowns

Donald Rumsfeld once said that there are things we know, and things we don't know; and there are things we don't know that we don't know. In this presentation we'll look at how to quantify "unknown" security problems, why they are important, and how they relate to protecting against online malicious activity. This presentation will describe a model of risk management based on knowns vs unknowns and show how it can apply to different risk management processes.

 

Dr. Spencer Soohoo

CSO/Director, Scientific Computing
Cedars-Sinai Medical Center

The Evolution of Healthcare Cybersecurity

Healthcare cybersecurity has historically lagged cybersecurity in other business sectors. But high-profile breaches have broadened the focus beyond HIPAA security and privacy compliance, and now, senior healthcare leaders are scrambling to catch up in terms of cybersecurity initiatives and spending. No longer are the CSO’s concerns viewed as theoretical. However, securing healthcare information is challenging because of the diversity of applications and medical devices where security has been an afterthought, a weak security culture, and the need to quickly access or share information for safe, effective patient care. This presentation will illustrate some of the challenges and lessons learned.

Hank Thomas

Principal/Cyber Intelligence and Security
Booz Allen Hamilton

Cyber Tradecraft or Espionage

Join a discussion of the journey of cyber intelligence from a military intelligence perspective and its application to commercial markets. Learn through vivid examples about cyber threats and impacts. Minimize your cyber risks by applying the cyber tradecraft and understand the criticality of espionage techniques for uncovering cyber threats 
 

sponsorships


Attendie Industries
Attendie Industries

Reach the Decision-makers in Cybersecurity – Present and Future

Cybersecurity is one of the Fastest-growing Markets in the World! Only IEEE Computer Society Attracts the C-Levels, the Top Techs, and the Hands-on Specifiers Who Are Driving This Rapidly Evolving Technology.

When you sponsor Rock Stars of Cybersecurity, you reach a unique audience – a level of decision-makers who don’t attend other symposia.

With an agenda aimed at real-world, business-critical decisions, and a lineup of experts unequaled at other cybersecurity events, Rock Stars of Cybersecurity is an obvious investment for any organization interested in influencing the future of cybersecurity technology.

  • Meet this influential group of users and potential users face-to-face
  • Enjoy the highly personal nature of the event to network and enhance your brand
  • Generate leads in a group where every attendee is a prospect
  • Share lunch and cocktails with people you want and need to know
  • Stimulate discussions resulting from the engaging, leading-edge presentations
  • Showcase your products and services in a dynamic, engaged environment

Sponsors at Rock Stars of Cybersecurity are integral parts of both the content and success of the event. Take advantage of these unique sponsorship opportunities –

Platinum Sponsor – Command the stage as a keynote speaker and help drive the future of 3D printing

Gold Sponsor

Silver Sponsor

Panel Speaker Slot

Demo Showcase Salon

Registration Sponsor

Luncheon Sponsor

Cocktail Reception Sponsor

Lunch Roundtable Sponsor – Bring a current customer and share your company’s technology story with a captive audience during lunch.

Table Top

Official Program Advertising

Conference Bag Insert

Sponsorship Contact

For more information and to secure your Startup Rock Stars sponsorship and/or exhibit space, please contact:
Sandy Brown
sbrown@computer.org
714-816-2144

venue


Hotel and Transportation

Fairmont Hotel

Located near Silicon Valley, the 20-story, two tower Fairmont San Jose caters to discerning and well-traveled business professionals. The hotel is conveniently located a short distance from San Jose International Airport. Half Price 'Green' Parking at Fairmonts in California provides overnight guests who drive hybrid vehicles reduced parking charges. 
 
 
 
170 South Market Street 
San Jose 
California, United States 
95113 
 
 
TEL + 1 408 998 1900 
FAX + 408 287 1648 
 

 

The Rock Stars of Cybersecurity Conference will be held on October 27 at the Fourth Street Summit CenterThe Fourth Street Summit Center, located three blocks from the Fairmont San Jose, features a 6,800-square-foot ballroom with more than 3,000 square feet of adjoining foyer space. Two open-air balconies and floor-to-ceiling windows provide spectacular views of Silicon Valley

 

88 South 4th Street
7th floor
San Jose CA 95192

Maps & Directions
http://www.fairmont.com/san-jose/map/map-and-directions/

TEL + 408 998 1900 
FAX + 408 287 1648

International Numbers
http://www.fairmont.com/contact-us/morenumbers/

 

 

register


Cybersecurity Badge

Register Now for Rock Stars of Cybersecurity 2015

 

27 Oct 2015 San Jose, CA

Early-Registration Pricing
$399
IEEE/IEEE Computer Society Member: $329
Teams: $199 each for groups of three or more
Students: $165
Discounts also available for multiple events.

 

.